Fraudsters’ new favorite place to snare unsuspecting online users is social media. As questions of how social media platforms can be held accountable for protecting their user base from misleading information continue to rise, it is becoming more clear that hundreds of thousands of users are being exposed to fraudulent content with the explicit purpose of collecting information or money from well-meaning suspects.

You would have to be living under a rock to have not heard about the growth of cryptocurrency lately. With Bitcoin reaching a record value of around $10,000 and Etherium continuing to creep toward further adoption, more businesses and individuals are considering ways that cryptocurrency could be worked into daily monetary transactions. These are just two of the ways we’re seeing domain names associated with cryptocurrency.

Think about your last online purchase: Did you just assume that it was safe to enter your credit card information or did you check for that little green padlock in the address bar? That padlock sign (or occasionally just a green address bar) indicates the presence of an SSL certificate, a security measure that ensures that sensitive information entered on that webpage will be safely encrypted.

SSL, or Secure Socket Layer, is the protocol that creates these secure connections for web users. It prevents private information from being compromised by eavesdropping, data tampering, or message forgery. It also gives consumers peace of mind as they fill out forms that contain sensitive information.

Millions of businesses use SSL certificates to assure visitors of their website’s security and legitimacy. If you think that your website could benefit from a SSL certificate, you can easily set it up through Name.com.

If you buy a domain name, it’s rightfully yours for as long as you continue to renew it. But in some unfortunate incidents, domain names are stolen by a hacker and either resold or used for nefarious purposes. Instances like these are called domain hijacking, and although they don’t happen often, they can be a serious headache deal with.

The best way to prevent domain hijacking from happening to you is to be proactive about your account’s security. By following these tips, you can do your part to keep your account—and your domains—safe.

If you’re new to websites, you may be unfamiliar with some of the additional services that registrars offer when you purchase a domain. One service that can be especially confusing is domain privacy protection. What is it? And is it really necessary?

With the abundance of news about compromised cyber security and hacking schemes, it’s natural to want to take extra precautions to keep your online information safe.

Two-Step Verification keeps your account extra secure by requiring a time-sensitive code in addition to a traditional login. As opposed to solely relying on a username and password, which can be guessed or figured out by an experienced crook, Two-Step Verification adds an extra layer of security.

Better yet, getting Two-Step Verification set up for your Name.com account is a simple task that can be done in a matter of minutes. Let’s walk through the steps.

It doesn’t make sense for Name.com to come out against CISPA. For a business, the Cyber Intelligence Sharing and Protection Act has some positives. As Nic in our company compliance says, “We would have a lesser degree of liability and potentially be able to more effectively report and respond to incidents like the recent DDoS attack.”

With CISPA, Name.com could voluntarily share with the government information related to “cybersecurity” and “cyber crimes” without risking a civil suit. Nic reports:

Sharing this information would not be mandated, and would also not require a warrant or any judicial oversight. All that would be required is a “good faith” belief that the information was related to a set of provisions (the most notable being the broadly defined “cybersecurity”). The idea is that being able to share this information will allow the government and private companies to react more quickly and more effectively to cyber threats.

In its current form, CISPA is not good.

As you can see, we should probably adore this thing. A lot of companies do, and after the DDoS that smacked us, it’s pretty darn tempting. Does there need to be something like #CISPA? Probably. Is this version the one? Nope.

The problem is, that like SOPA, this bill is way too broad to embrace. It lacks safeguards to protect against abuse of privacy, confidentiality and civil liberties. Nic again: “CISPA does openly reject the notion of a free, open and anonymous internet and empowers companies to take action against users without the ability for users to pursue legal remedies.”

We can’t support that. What we can support is the Electronic Frontier Foundation and its decades-long effort to protect the digital rights of the consumer and the general public. And we’ll have some fun doing it.

Play the What Should CISPA stand for Whackronym Acronym Game.

It’s easy. In the comments below include your winning version of C.I.S.P.A. An example might be, and just so we don’t take a really good one: Crikey, It’s Silly Politics Again. Wait, that was kind of good. Anyway, do better. We’ll have our staff vote on the comments with the most “likes.” Sounds pretty Internety, eh? Just like we like it.

First Place: A $500 donation in your name or that of your organization to the Electronic Frontier Foundation.

Second Place: A $300 donation in your name or that of your organization to the Electronic Frontier Foundation.

Third Place: A $200 donation in your name or that of your organization to the Electronic Frontier Foundation.

And because of your general awesomeness, we’ll probably be giving random prizes to keep you motivated in the fight. Oh, and if you don’t win this contest, unfortunately there will most likely be another opportunity. As Tim Berners-Lee, the inventor of the WWW, says, “[It] is threatening the rights of people in America, and effectively rights everywhere, because what happens in America tends to affect people all over the world. Even though the SOPA and PIPA acts were stopped by huge public outcry, it’s staggering how quickly the US government has come back with a new, different, threat to the rights of its citizens.”